<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>RouterOS (6.49.8) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/routeros-6.49.8/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/routeros-6.49.8/feed.xml" rel="self" type="application/rss+xml"/><item><title>MikroTik RouterOS SCEP Endpoint Out-of-Bounds Read Vulnerability (CVE-2026-7668)</title><link>https://feed.craftedsignal.io/briefs/2024-01-routeros-oob-read/</link><pubDate>Tue, 02 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-routeros-oob-read/</guid><description>MikroTik RouterOS 6.49.8 is vulnerable to an out-of-bounds read in the SCEP endpoint component, triggered by remote manipulation of the transactionID/messageType argument, potentially leading to denial of service or information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-7668 is an out-of-bounds read vulnerability affecting MikroTik RouterOS version 6.49.8. The vulnerability exists within the SCEP (Simple Certificate Enrollment Protocol) endpoint, specifically in the <code>ASN1_STRING_data</code> function located in the <code>nova/lib/www/scep.p</code> library. A remote attacker can exploit this vulnerability by manipulating the <code>transactionID</code> or <code>messageType</code> arguments. Publicly available exploits exist, increasing the risk of exploitation. The vendor has been notified but has not provided a response. Exploitation could lead to denial of service or information disclosure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a MikroTik RouterOS device running version 6.49.8 with an exposed SCEP endpoint.</li>
<li>The attacker crafts a malicious SCEP request containing a specially crafted <code>transactionID</code> or <code>messageType</code> argument.</li>
<li>The attacker sends the malicious SCEP request to the RouterOS device&rsquo;s SCEP endpoint.</li>
<li>The <code>ASN1_STRING_data</code> function processes the request and attempts to access memory outside the allocated buffer due to the manipulated argument.</li>
<li>The out-of-bounds read occurs, potentially leading to a crash of the SCEP process or the disclosure of sensitive information from adjacent memory regions.</li>
<li>If the attacker can reliably trigger a crash, they can cause a denial of service.</li>
<li>If sensitive information is disclosed, the attacker might use this to further compromise the device or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7668 can lead to a denial of service condition on the affected MikroTik RouterOS device. An attacker could potentially cause the device to become unresponsive, disrupting network services. Furthermore, the out-of-bounds read could expose sensitive information stored in memory, which an attacker could use to further compromise the device or network. Since an exploit is publicly available, the risk of widespread exploitation is elevated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for SCEP requests with unusually long or malformed <code>transactionID</code> or <code>messageType</code> parameters. Use the network connection rule below.</li>
<li>Implement rate limiting on the SCEP endpoint to mitigate potential denial-of-service attacks.</li>
<li>While no patch is available, consider disabling the SCEP endpoint if it is not required.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>out-of-bounds read</category><category>routeros</category></item></channel></rss>